Learn about CVE-2023-35150 impacting XWiki Platform versions, allowing remote code execution via manipulated URLs. Find mitigation steps and patching details.
This article provides detailed information about CVE-2023-35150, covering its description, impact, technical details, and mitigation steps.
Understanding CVE-2023-35150
XWiki Platform is vulnerable to privilege escalation from view right via the Invitation application, impacting versions ranging from >= 2.4-m-2 to < 14.4.8 and >= 14.5 to < 14.10.4.
What is CVE-2023-35150?
XWiki Platform, a wiki platform providing runtime services for applications, allows users with view rights on any document to execute code with programming rights, enabling remote code execution through a crafted URL.
The Impact of CVE-2023-35150
The vulnerability poses a critical threat with a CVSS v3.1 base score of 9.9, high confidentiality and integrity impacts, and low privileges required for exploitation.
Technical Details of CVE-2023-35150
The vulnerability in XWiki Platform involves improper neutralization of directives in dynamically evaluated code, categorized under CWE-95.
Vulnerability Description
Users can manipulate URLs to execute code with programming rights, leading to potential remote code execution.
Affected Systems and Versions
XWiki Platform versions from >= 2.4-m-2 to < 14.4.8 and >= 14.5 to < 14.10.4 are affected by this vulnerability.
Exploitation Mechanism
By exploiting the flaw, attackers can escalate their privileges and execute malicious code remotely via crafted URLs.
Mitigation and Prevention
It is crucial to take immediate action to address the CVE-2023-35150 vulnerability and prevent potential exploitation.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates